Utility Commands. Note. System Management Command Reference for Cisco NCS 6000 Series Routers 1

Size: px
Start display at page:

Download "Utility Commands. Note. System Management Command Reference for Cisco NCS 6000 Series Routers 1"

Transcription

1 This module describes the utility commands for Cisco IOS XR software. Utility commands provide CLI equivalents to common UNIX commands. Note Keywords are entered using the displayed syntax, or with UNIX-equivalent syntax. The UNIX-equivalent syntax is displayed in parentheses () in the syntax description. For example, the universal keyword can also be entered using the UNIX-equivalent (-u). To display the UNIX-equivalent syntax online, enter the usage keyword. utility cut, page 2 utility date, page 7 utility date set, page 10 utility fgrep, page 12 utility find, page 14 utility less, page 16 utility mv, page 18 utility sort, page 20 utility tail, page 24 utility uniq, page 27 utility wc, page 30 1

2 utility cut utility cut To extract selected characters or fields from standard input or from a file, use the utility cut command in mode. utility cut {{list character-list fields field-list [nodelim] [delimiter delimiter-character] WORD} [file input-file] usage} Syntax Description list character-list fields field-list nodelim (-c) Cuts out the characters that are located on each line as specified with the character-list argument. The character-list argument specifies the character positions or range of the characters to be cut. Note Use a comma (,) to indicate more than one character. For example, utility list 1,2,5 outputs the first, second, and fifth characters. Use a dash (-) to indicate a range. For example, utility list 1-64 outputs the first 64 characters of each line, utility list 5- outputs the fifth character to the end of the line. Lines are separated by a delimiter. The default delimiter is tab. (-f) Cuts out the fields (lines) as indicated with the field-list argument. The field-list argument specifies the field numbers or ranges. For example, utility field 2,9 outputs the second and ninth fields, utility field 1-3 outputs the first three fields, utility field -6 outputs the first six fields. Note The fields indicated by the field-list argument are assumed to be separated in the file by a delimiter character. The default delimiter is tab. Use the delimiter delimiter option to specify a delimiter character. Lines without field delimiters are processed unless the nodelim keyword is specified. (Optional) (-s) Ignores lines with no delimiter. Use this optional keyword when the fields field-list keyword and argument is specified. delimiter delimiter-character (Optional) (-d) Specifies an alternative delimiter to indicate the end of each field. Replace the delimiter-character argument with the character used as the delimiter. WORD (Optional) UNIX command-line option string. The maximum number of characters is 80. 2

3 utility cut file input-file usage (Optional) Storage device and directory path of the text file used instead of the standard input (keyboard input). The syntax of the input-file argument is: device :[/ directory-path]/ filename The device argument, followed by a colon, indicates the name of the device where the file is located. Use the online help (?) function to display the available storage devices and network protocols. (Optional) Displays the UNIX options supported by this command. Command Default If no file is specified, the keyboard input (standard input) is used. The delimiter is tab. Command Modes Command History Release Release Release Modification No modification. This command was introduced. Usage Guidelines To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance. The utility cut command cuts out columns, fields, or characters displayed from standard input or from a file. Use the fields field-list keyword and argument if the fields vary in length from line to line. (The lines must be separated by a delimiter character.) By default, the field delimiter character is the Tab key. Use the delimiter delimiter-character keyword and argument to specify a different delimiter. Use the list character-list keyword and argument only if the fields are of a fixed length. Replace the character-list argument with the character positions to be extracted. For the character-list argument, use a comma (,) to indicate more than one character, or use a dash (-) to indicate a range. For example, utility list 1,2,5 outputs the first, second, and fifth characters, utility list 1-64 outputs the first 64 characters of each line, utility list 5- outputs the fifth character to the end of the line. You can also use the cut utility as a filter. If no files are specified, the keyboard input (standard input) is used. Note Keywords are entered using the displayed syntax, or with UNIX-equivalent syntax. The UNIX-equivalent syntax is displayed in parentheses () in the syntax description. For example, the fields keyword can also be entered using the UNIX-equivalent (-f). To display the UNIX-equivalent syntax online, enter the usage keyword. 3

4 utility cut universal Operations execute Examples In the following example, the utility cut command is entered with the list character-list keyword and argument to display the first 10 characters in each line. The output is from the results of the show version command, which is entered with the pipe ( ) character: RP/0/RP0/CPU0:router# show version utility cut list 1-10 Cisco IOS Copyright ROM: Syste router upt System ima cisco CRS proce 16 Gigabit 2 Ethernet 20 Packet 20 SONET/S 2043k byte 38079M byt k b k b Configurat Package ac --More-- In the following example, the utility cut command is used to extract fields from a file: RP/0/RP0/CPU0:router# utility cut fields 1,5 delimiter : file disk0:/usr/passwd root:super-user daemon: bin: sys: adm:admin lp:line Printer Admin uucp:uucp Admin nuucp:uucp Admin listen:network Admin nobody:nobody In the following example, the utility cut command is used with the delimiter keyword to specify an alternative field delimiter: RP/0/RP0/CPU0:router# utility cut fields 1,4,5 delimiter : file disk0:/usr/passwd root:1:super-user daemon:1: bin:2: sys:3: adm:4:admin lp:8:line Printer Admin uucp:5:uucp Admin 4

5 utility cut nuucp:9:uucp Admin listen:4:network Admin In the following example, a range of fields is specified: RP/0/RP0/CPU0:router# utility cut fields 1-4 delimiter : file disk0:/usr/passwd root:x:0:1 daemon:x:1:1 bin:x:2:2 sys:x:3:3 adm:x:4:4 lp:x:71:8 uucp:x:5:5 nuucp:x:9:9 listen:x:37:4 In the following example, the list character-list keyword and argument are used to specify the character positions to be extracted: RP/0/RP0/CPU0:router# utility cut list 1-30 file disk0:/usr/passwd root:x:0:1:super-user:/:/sbin/ daemon:x:1:1::/: bin:x:2:2::/usr/bin: sys:x:3:3::/: adm:x:4:4:admin:/var/adm: lp:x:71:8:line Printer Admin:/ uucp:x:5:5:uucp Admin:/usr/lib nuucp:x:9:9:uucp Admin:/var/sp listen:x:37:4:network Admin:/u nobody:x:60001:60001:nobody:/: noaccess:x:60002:60002:no Acce nobody4:x:65534:65534:sunos 4. ========================================================================== In the following example, the UNIX equivalent options are used directly. First, the utility cut command is entered with the usage keyword to display the possible options. Next, the utility cut command is entered with the options to extract the desired data. RP/0/RP0/CPU0:router# utility cut usage cut -c list [file], cut -f list [-d delim] [-s] [file] RP/0/RP0/CPU0:router# utility cut -f 1,4 -d : disk0:/usr/passwd root:1 daemon:1 bin:2 sys:3 adm:4 lp:8 Related Commands Command utility sort, on page 20 utility tail, on page 24 Description Sorts, merges, or sequence-checks the output displayed from standard input or a file. Copies the end portion of the output displayed from standard input or a file. 5

6 utility cut 6

7 utility date utility date To display the date and time, use the utility date command in mode. utility date {format word universal usage WORD} Syntax Description format word universal usage WORD (Optional) (+) Specifies the format for the date display. Use the online help system to display the available format syntax for the word argument. (Optional) (-u) Displays the date in Coordinated Universal Time (UTC) instead of local time. UTC is the standard term for Greenwich Mean Time (GMT). (Optional) Displays the UNIX options supported by this command. (Optional) UNIX command-line option string. The maximum number of characters is 80. Command Default The date is displayed in local time. Command Modes Command History Release Release Release Modification No modification. This command was introduced. Usage Guidelines To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance. The utility date command displays the internal time and date for the router. Date Format Use the format word option to specify the format and content of the displayed date and time. The format is composed of ASCII characters and field descriptors prefaced with %, in a manner similar to a C-language printf() format specifier. In the output, each field descriptor is replaced by its corresponding value; all other characters are copied to the output without change. The format is specified using the following characters: 7

8 utility date %C Century in 'CC' form. For example: 20 %y Year in 'YY' form. For example: 06 %m Month in 'MM' form. For example: 08 %d Date in 'DD' form. For example: 28 %H Hour in 'hh (24 hr.)' form. For example: 18 %M Minutes in 'mm' form. For example: 55 %S seconds in 'ss' form. For example: 24 Note Keywords are entered using the displayed syntax, or with UNIX-equivalent syntax. The UNIX-equivalent syntax is displayed in parentheses () in the syntax description. For example, the universal keyword can also be entered using the UNIX-equivalent (-u). To display the UNIX-equivalent syntax online, enter the usage keyword. universal Operations execute Examples This example shows how to display the router date and time using the utility date command: RP/0/RP0/CPU0:router# utility date Fri Aug 04 11:53:38 UTC 2006 This example shows how to display the router date and time using a variety of options with the format keyword: RP/0/RP0/CPU0:router# utility date format "%y%m%d" RP/0/RP0/CPU0:router# utility date format "%y-%m-%d" 8

9 utility date RP/0/RP0/CPU0:router# utility date format "%C%y-%m-%d" RP/0/RP0/CPU0:router# utility date format "%C%y-%m-%d:%H:%M:%S" :02:09:58 RP/0/RP0/CPU0:router# utility date format "DATE: %y-%m-%d %ntime: %H:%M:%S" DATE: TIME: 12:42:24 Related Commands Command utility date set, on page 10 Description Sets the internal date and time of the router. 9

10 utility date set utility date set To set the router time, use the utility date set command in mode. utility date set hh:mm:ss Syntax Description hh mm SS Specifies the hour in 2-digit numerical format. Range is 00 to23. Specifies the minutes in 2-digit numerical format. Range is 0 to 59. Specifies the seconds in 2-digit numerical format. Range is 0 to 59. Command Default None Command Modes System Admin EXEC Command History Release Release Release Modification No modification. This command was introduced. Usage Guidelines To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance. A colon (:) is required between the entry for hour, minutes, and seconds. Note Generally, if the system is synchronized by a valid outside timing mechanism, such as a Network Time Protocol (NTP) clock source, or if you have a networking device with calendar capability, you need not set the software clock. Use the date command or the clock set command if no other time sources are available. Note To manually copy the hardware clock (calendar) settings into the software clock, use the clock read-calendar command in EXEC mode. By default, the system makes a slow adjustment if the new time is in the range of the following: 2.5 minutes + old time 10

11 utility date set 5 minutes + old time In a slow adjustment, the clock speed increases by less than 100 percent or decreases by less than 50 percent over a period of time from 1 second to 5 minutes until the clock catches up with the new time. This slow adjustment does not cause major discontinuities in the time flow. Use the -S0 option to disable the slow adjustment. universal Operations execute Examples The following example shows how to set the time using the utility date set command: RP/0/RP0/CPU0:router(admin)# utility date set 13:07:00 Fri Sep 15 13:07:00 UTC 2006 Related Commands Command utility date, on page 7 Description Displays the internal date and time of the router. 11

12 utility fgrep utility fgrep To search a file for a fixed character string, use the utility fgrep command in mode. utility fgrep {expr expression script expression-file} [ WORD ] [count] [linenum] [matchfile] [matchline] [nocase] [nofile] [reverse] [file search-file] utility fgrep expression [ WORD ] [count] [linenum] [matchfile] [matchline] [nocase] [nofile] [reverse] [file search-file] utility fgrep usage Syntax Description expr expression script expression-file WORD count linenum matchfile matchline nocase nofile reverse file search-file (-e) A regular expression, whose type is determined by the -e and -f options. This form is used when only one expression is specified on the command line. Any names specified after this option are treated as input files. (-f) A file containing a set of regular expressions, each separated by a new line. The type of the expressions is determined by the -e and -f options. This form is used when more than one expression is specified. You can specify more than one -f option. The syntax of the expression-file argument is: device :[/ directory-path]/ filename (Optional) UNIX command-line option string. The maximum number of characters is 20. (Optional) (-c) Displays a count of selected lines. (Optional) (-n) Before each output line, displays the line's line number. (Optional) (-l) ( el ) Displays only the names of files containing the selected lines. (Optional) (-x) Includes only input lines selected against an entire fixed string or regular expression. (Optional) (-i) Ignores uppercase and lowercase distinctions during comparisons. (Optional) (-h) Displays results without a filename prefix attached to the matched lines. This option applies only when more than one file is searched. (Optional) (-v) Selects only those lines that don't match the specified patterns. (Optional) The file used for the search. Replace the search-file argument with the device and directory path of the file. The syntax for the search-file argument is: device :[/ directory-path]/ filename 12

13 utility fgrep usage (Optional) Displays the UNIX options supported by this command. Command Default The keyboard input (standard input) is used if no files are specified. If more than one input file is specified, then the filename is displayed before each line. Command Modes Command History Release Release Release Modification No modification. This command was introduced. Usage Guidelines To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance. The utility fgrep command searches files for a fixed character string (as opposed to grep and egrep, which search for a a pattern that matches an expression). The results are displayed to the standard output (terminal screen). Note The fgrep utility options are entered using the displayed syntax, or with UNIX-equivalent syntax. The UNIX-equivalent syntax is displayed in parentheses () in the syntax description. For example, the count keyword can also be entered using the UNIX-equivalent (-c). To display the UNIX-equivalent syntax online, enter the usage keyword. universal Operations execute Examples The following example, the utility fgrep command is used with the nocase and linenum keywords: RP/0/RP0/CPU0:router# show version utility fgrep expr uptime nocase linenum 7:router uptime is 5 days, 20 hours, 10 minutes 13

14 utility find utility find To locate files within one or more directories, use the utility find command in mode. utility find {path directory-path {LINE name filename-pattern user user-id} usage} Syntax Description path directory-path LINE name filename-pattern user user-id usage Specifies the storage device and directory for the file search. The search is performed for the specified directory and all subdirectories in that directory tree. If a directory path is not specified, then the search is performed in the current directory (a path of. [dot] is assumed). (Optional) UNIX command-line expressions provided as a string. (Optional) Searches for the name of the file. The filename-pattern argument is a regular expression string. (Optional) Searches for files belonging to a specific user. The user-id argument is the username of the file owner. (Optional) Displays the UNIX options supported by this command. Command Default If a directory path is not specified, then the search is performed in the current directory. If a name filename-pattern is not specified, then the search return all files in the specified directory. If a user is not specified, then the search is performed for all users. Command Modes Command History Release Release Release Modification No modification. This command was introduced. Usage Guidelines To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance. 14

15 utility find Use the utility find command to locate files within one or more directories. You can perform the search for a specific directory (and its subdirectories). If a directory is not specified, then the search is performed for the current directory. To search for a regular expression string, use the name filename-pattern keyword and argument. Replace the filename-pattern argument with the regular expression string. If this option is not used, then all files within the specified directory are displayed. To search for files belonging to a specific user, use the user-id argument. If this option is not used, then files belonging to all users are displayed. universal Operations execute Examples In the following example, theutility find command is used to locate the file named -fwdg The path is the root directory of disk0:. RP/0/RP0/CPU0:router# utility find path disk0: name hfr-fwdg disk0:/instdb/admin_pkgs_mdata/hfr-fwdg disk0:/hfr-fwdg In the following example, the utility find command is used to locate files matching a pattern. In this example, all files ending in.txt are displayed: RP/0/RP0/CPU0:router# utility find path disk0:/usr name *.txt disk0:/usr/test2.txt In the following example, the UNIX equivalent option is used to locate files matching a pattern. In this example, all files ending in.txt are displayed: RP/0/RP0/CPU0:router# utility find path disk0: -name *.txt disk0:/-base-3.8.0/etc/vim/doc/editing.txt disk0:/-base-3.8.0/etc/vim/doc/help.txt disk0:/-base-3.8.0/etc/vim/doc/intro.txt disk0:/-base-3.8.0/etc/vim/doc/uganda.txt disk0:/usr/test2.txt In the following example, the files belonging to a specific user are displayed: RP/0/RP0/CPU0:router# utility find path disk0:/usr user 0 disk0:/usr disk0:/usr/passwd disk0:/usr/test2.txt In the following example, the UNIX equivalent option is used to display files belonging to a specific user: RP/0/RP0/CPU0:router# utility find path disk0:/usr -user 0 disk0:/usr disk0:/usr/passwd disk0:/usr/test2.txt 15

16 utility less utility less To display a file page-by-page, use the utility less command in mode. utility less {[exiteof] [ WORD ] nocase position line-number startat string} [file source-file] Syntax Description exiteof WORD nocase position line-number startat string file source-file (Optional) (-E) Automatically exits the utility the first time an end-of-file is encountered. (Optional) UNIX command-line option string. The maximum number of characters is 80. (Optional) (-i) Ignores uppercase and lowercase distinctions during comparisons. (Optional) (-j) Uses the line at line-number on the screen to position matched lines during a patter search. (Optional) (-p) Starts at the first occurrence of the pattern specified by the string argument in the file. (Optional) Specifies the storage device and directory path for the text file to be displayed. The default is standard input. The syntax for the source-file argument is: device :[/ directory-path]/ filename Command Default If no text file is specified, standard input is assumed. Command Modes Command History Release Release Release Modification No modification. This command was introduced. Usage Guidelines To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance. 16

17 utility less Use the utility lesscommand to display files page by page. You can specify regular expressions for pattern matching using the startat keyword. You can scroll up as well as down. When you enter the less mode, commands are similar to the vi editor. Note Keywords are entered using the displayed syntax, or with UNIX-equivalent syntax. The UNIX-equivalent syntax is displayed in parentheses () in the syntax description. To display the UNIX-equivalent syntax online, enter the usage keyword. universal Operations execute Examples The following example, the utility less command is used to display the file config_store. Only part of the file is shown here. RP/0/RP0/CPU0:router# utility less file disk0:/usr/config_store Last configuration change at Tue Feb 20 18:34: by xxx! hostname H1 line console exec-timeout session-timeout 600! line default exec-timeout session-timeout 600!... 17

18 utility mv utility mv To rename or move a file from one directory to another, use the utility mv command in mode. utility mv {[WORD force interactive] source source-file target target-file usage} Syntax Description WORD force interactive source source-file target target-file usage (Optional) UNIX command-line option string. The maximum number of characters is 80. (Optional) (-f) Forces an overwrite if the target file already exists. There is no confirmation prompt. (Optional) (-i) Specifies to prompt for confirmation before renaming a file. Specifies the storage device, directory, and filename for the file to be moved. Specifies the new storage device, directory, and filename for the file. (Optional) Displays the UNIX options supported by this command. Command Default No default behavior or values Command Modes Command History Release Release Release Modification No modification. This command was introduced. Usage Guidelines To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance. Note Keywords are entered using the displayed syntax, or with UNIX-equivalent syntax. The UNIX-equivalent syntax is displayed in parentheses () in the syntax description. To display the UNIX-equivalent syntax online, enter the usage keyword. 18

19 utility mv universal Operations execute Examples In the following example, the utility mv command is used to move the file aaa from disk0a: to disk1a: RP/0/RP0/CPU0:router# utility mv source disk0a:/aaa target disk1a:/aaa Related Commands Command utility cut, on page 2 utility sort, on page 20 utility tail, on page 24 Description Cuts characters or lines from the output displayed from standard input or a file. Sorts, merges, or sequence-checks the output displayed from standard input or a file. Copies the end portion of the output displayed from standard input or a file. 19

20 utility sort utility sort To sort, merge, or sequence-check the lines in one or more files, or from the standard input, use the utility sort command in mode. utility sort {[[ WORD ] [[dict] [fieldsep character] [ignoreblank] [key key-definition] [lowercase] [merge] [numeric] [outfile filename] [printable] [reverse] [unique]]] [file filename] usage} Syntax Description WORD dict fieldsep character ignoreblank key key-definition lowercase merge (Optional) UNIX command-line option string. The maximum number of characters is 80. (Optional) (-d) Sorts in dictionary order. Uses only alphanumeric and blank characters in the sort operation. (Optional) (-t) Specifies a character as the field separator. (Optional) (-b) Ignores leading blank characters in field comparisons. (Optional) (-k) Defines a key to be the sort key. The key-definition argument field is defined using the following syntax: field_start [type_string] [,field_end] [type_string] field_start and field_end Specifies the beginning and end of the key field. type_string Specifies attributes specific to the key. The field_start and field_end arguments are each specified by a pair of digits of the form m.n, where the m refers to the field starting after the mth field separator in a line. For field_start, the.n refers to the nth character of the specified field, and is taken as zero if not specified. For field_end, the.n refers to the nth character after the last character of the specified field, and is taken as zero if not specified. The type_string argument may be formed from the characters bdfinr, which apply their defined attributes to the determination of the key. Note When ordering options appear independent of key field specifications, the requested field ordering rules are applied globally to all sort keys. When attached to a specific key, the specified ordering options override all global ordering options for that key. (Optional) (-f) Folds uppercase letters into lowercase (ignores case and treats upper case characters the same as lowercase characters). (Optional) (-m) Merges sorted files. Assumes that the files are already sorted and so does not sort the files. 20

21 utility sort numeric outfile filename printable reverse unique file filename usage (Optional) (-n) Interprets the field as numeric and sorts in numeric order. Includes the sign and optional thousands separator. This keyword also ignores leading blank characters in field comparisons (implies the ignoreblank keyword). (Optional) (-o) Writes the results to a file. The filename argument is the destination disk, directory, and filename. The filename argument can be the same as the source file. (Optional) (-i) Ignores all nonprintable characters. (Optional) (-r) Reverses the sort order. The sort is ascending by default. (Optional) (-u) Suppresses all but one line in each set of lines having equal keys. (Optional) Specifies a file to be sorted. (Optional) Displays the UNIX options supported by this command. Command Default If no file is specified, then the standard input (keyboard) is used. If an outfile filename keyword and argument is not specified, then the standard output (display) is used. The file is sorted in ascending order. Command Modes Command History Release Release Release Modification No modification. This command was introduced. Usage Guidelines To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance. Note Keywords are entered using the displayed syntax, or with UNIX-equivalent syntax. The UNIX-equivalent syntax is displayed in parentheses () in the syntax description. To display the UNIX-equivalent syntax online, enter the usage keyword. 21

22 utility sort universal Operations execute Examples In the following example, the utility sort command is used to sort the contents of the file words.txt : RP/0/RP0/CPU0:router# utility sort file disk0:/usr/words.txt The few inquires A Code. Date Done This best-selling bestseller book come concerning fiction, have its list muscled of onto our the way way work In the following example, only the unique characters in the file words.txt are displayed: RP/0/RP0/CPU0:router# utility sort unique file disk0:/usr/words.txt Code. Date best-selling book concerning have list of our way work Related Commands Command utility cut, on page 2 utility tail, on page 24 Description Cuts characters or lines from the output displayed from standard input or a file. Copies the end portion of the output displayed from standard input or a file. 22

23 utility sort Command utility uniq, on page 27 Description Displays or removes repeated lines in a file. 23

24 utility tail utility tail To copy the end portion of a file or the standard input, use the utility tail command in mode. utility tail {[[ WORD ] [bytes] [continuous] [count number]] [file input-file] usage} Syntax Description WORD bytes continuous count number file input-file usage (Optional) UNIX command-line option string. The maximum number of characters is 80. (Optional) (-c) Copies the end of the file measured in bytes. The default is lines. (Optional) (-f) Continues to copy data from the end of the file after the last line is reached. The operation pauses for 1 second, and then resumes in a continuous loop. The input file must be a regular file, not a terminal or a FIFO special file (a named pipe). (Optional) (-n) Copies the number of lines (default) or bytes specified with the number argument. The range is 0 to By default, the last 10 lines are copied. The number argument is a decimal integer that defines the location in the file to begin copying: Note Include the plus (+) character to copy from the beginning of the file. Include the minus (-) character to copy from the end of the file. Do not include a character to copy from the end of the file. Select the bytes keyword to copy the information measured in a count of bytes. (Optional) Directory path and filename for the input file. If no file is specified, then the standard input is used. The syntax for the input-file argument is: device :[/ directory-path]/ filename The device argument, followed by a colon, indicates the name of the device where the file is located. Use the online help (?) function to display the available storage devices and network protocols. (Optional) Displays the UNIX options supported by this command. Command Default If the utility tail command is entered without keywords or arguments, the last 10 lines of the standard input are copied. Command Modes 24

25 utility tail Command History Release Release Release Modification No modification. This command was introduced. Usage Guidelines To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance. Use the utility tail command to copy data from the end of a file. By default, the last 10 lines are copied. Use the bytes keyword to copy the data measured in bytes. Use the count number option to define the number of lines or bytes to copy. Use the file filename option to specify an input file. Note Keywords are entered using the displayed syntax, or with UNIX-equivalent syntax. The UNIX-equivalent syntax is displayed in parentheses () in the syntax description. To display the UNIX-equivalent syntax online, enter the usage keyword. universal Operations execute Examples In the following example, the utility tail command is used to display the last 10 lines of the output from the show version command: In the following example, the utility tail command is used with the bytes keyword to display the last 10 bytes in the output: RP/0/RP0/CPU0:router# show version utility tail count 10 bytes.95.3-p8 RP/0/RP0/CPU0:router# Related Commands Command utility cut, on page 2 utility sort, on page 20 Description Cuts characters or lines from the output displayed from standard input or a file. Sorts, merges, or sequence-checks the output displayed from standard input or a file. 25

26 utility tail 26

27 utility uniq utility uniq To display or remove repeated lines in a file, use the utility uniq command in mode. utility uniq [[[ WORD ] [afterchars number] [afterfield number] [count] [nonrepeating repeating]] [infile input-file outfile output-file] usage] Syntax Description WORD afterchars number afterfield number count nonrepeating repeating infile input-file outfile output-file usage (Optional) UNIX command-line option string. The maximum number of characters is 80. (Optional) (-s) Ignores the first characters on each line of the input file. Use the number argument to specify the number of characters. The range is 0 to (Optional) (-f) Ignores the first fields on each line of the input file. Use the number argument to specify the number of fields. The range is 0 to (Optional) (-c) Displays the number of times the line appeared in the input file at the beginning of each output line. (Optional) (-u) Displays only the nonrepeating lines from the input file (repeating lines are not displayed). (Optional) (-d) Displays only the repeating lines from the input file (nonrepeating lines are not displayed). (Optional) Specifies an input file for processing. The input-file argument specifies the device, directory, and filename of the input file. If no input file is specified, then the standard input (keyboard) is used. The syntax of the input-file argument is: device :[/ directory-path]/ filename. The device argument, followed by a colon, indicates the name of the device where the file is located. Use the online help (?) function to display the available storage devices and network protocols. (Optional) Specifies an output file. The output-file argument specifies the device, directory, and filename of the output file. If no file is specified, then the standard output (display) is used. The syntax of the output-file argument is: device :[/ directory-path]/ filename. The device argument, followed by a colon, indicates the name of the device where the file is located. Use the online help (?) function to display the available storage devices and network protocols. (Optional) Displays the UNIX options supported by this command. 27

28 utility uniq Command Default If no input file is specified, then the standard input is used. If no output file is specified, then the standard output is used. Command Modes Command History Release Release Release Modification No modification. This command was introduced. Usage Guidelines To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance. Use the utility uniq command to display only lines that are repeated in a file, or to display only lines that appear once. This utility compares only adjacent lines, so the file or standard input must be sorted. Note Keywords are entered using the displayed syntax, or with UNIX-equivalent syntax. The UNIX-equivalent syntax is displayed in parentheses () in the syntax description. To display the UNIX-equivalent syntax online, enter the usage keyword. universal Operations execute Examples In the following example, the utility uniq command is used to display the repeating lines in the output of the show environment command: RP/0/RP0/CPU0:router# show environment utility uniq repeating host 5V 4500, , ,6000 fabricq 1.25V 1125, , ,1500 fabricq 1.25V 1125, , ,1500 ingress 1.25V 1125, , ,1500 spa5 1.5V 1500,0 1575,1425 0,0 host 5V 4500, , ,6000 fabricq 1.25V 1125, , ,1500 fabricq 1.25V 1125, , ,1500 ingress 1.25V 1125, , ,1500 spa5 1.5V 1500,0 1575,1425 0,0 28

29 utility uniq Related Commands Command utility sort, on page 20 Description Sorts, merges, or sequence-checks the output displayed from standard input or a file. 29

30 utility wc utility wc To count words, lines, or bytes in a file, use the utility wc command in mode. utility wc [[[ WORD ] [bytes] [lines] [words]] [file input-file] usage] Syntax Description WORD bytes lines words file input-file usage (Optional) UNIX command-line option string. The maximum number of characters is 80. (Optional) (-c) Displays the number of bytes in each input file. (Optional) (-l) (-œel-?) Displays the number of lines in each input file. (Optional) (-w) Displays the number of words in each input file. (Optional) Specifies the input file. The input-file argument specifies the device, directory, and filename of the input file. If no input file is specified, then the standard input (keyboard) is used. The syntax of the input-file argument is: device :[/ directory-path]/ filename. The device argument, followed by a colon, indicates the name of the device where the file is located. Use the online help (?) function to display the available storage devices and network protocols. (Optional) Displays the UNIX options supported by this command. Command Default Output is displayed in the order bytes, words, and lines, even if the options are entered in a different order. Command Modes Command History Release Release Release Modification This command was introduced. No modification. Usage Guidelines To use this command, you must be in a user group associated with a task group that includes appropriate task IDs. If the user group assignment is preventing you from using a command, contact your AAA administrator for assistance. 30

31 utility wc Output is displayed in the following order: When keywords are entered, the output appears in the order bytes, words, and lines. When no keyword is entered, the output appears in the order lines, words, and bytes. When any UNIX equivalent options are entered, the output appears in the order specified by the options. For example, if the command utility wc -w -l -c is entered, the output appears in the order words, lines, and bytes. Note Keywords are entered using the displayed syntax, or with UNIX-equivalent syntax. The UNIX-equivalent syntax is displayed in parentheses () in the syntax description. To display the UNIX-equivalent syntax online, enter the usage keyword. universal Operations execute Examples In the following example, the utility wccommand is issued to display the number of lines, words, and bytes in the output of the show version command: RP/0/RP0/CPU0:router# show version utility wc The output displays the following: 221 lines 1160 words bytes In the following example, the utility wc command is entered with the words keyword to display the number of words in the output of the show version command: RP/0/RP0/CPU0:router# show version utility wc words

32 utility wc 32

Utility Commands on the Cisco IOS XR Software

Utility Commands on the Cisco IOS XR Software Utility Commands on the Cisco IOS XR Software This module describes the utility commands for Cisco IOS XR software. Utility commands provide CLI equivalents to common UNIX commands. Note Keywords are entered

More information

Utility Commands on the Cisco IOS XR Software

Utility Commands on the Cisco IOS XR Software Utility Commands on the Cisco IOS XR Software This module describes the utility commands for Cisco IOS XR software. Utility commands provide CLI equivalents to common UNIX commands. Note Keywords are entered

More information

Utility Commands on the Cisco ASR 9000 Series Router

Utility Commands on the Cisco ASR 9000 Series Router Utility Commands on the Cisco ASR 9000 Series Router This module describes the utility commands for Cisco IOS XR software. Utility commands provide CLI equivalents to common UNIX commands. Note Keywords

More information

Basic Unix Command. It is used to see the manual of the various command. It helps in selecting the correct options

Basic Unix Command. It is used to see the manual of the various command. It helps in selecting the correct options Basic Unix Command The Unix command has the following common pattern command_name options argument(s) Here we are trying to give some of the basic unix command in Unix Information Related man It is used

More information

File Commands. Objectives

File Commands. Objectives File Commands Chapter 2 SYS-ED/Computer Education Techniques, Inc. 2: 1 Objectives You will learn: Purpose and function of file commands. Interrelated usage of commands. SYS-ED/Computer Education Techniques,

More information

- c list The list specifies character positions.

- c list The list specifies character positions. CUT(1) BSD General Commands Manual CUT(1)... 1 PASTE(1) BSD General Commands Manual PASTE(1)... 3 UNIQ(1) BSD General Commands Manual UNIQ(1)... 5 HEAD(1) BSD General Commands Manual HEAD(1)... 7 TAIL(1)

More information

5/8/2012. Exploring Utilities Chapter 5

5/8/2012. Exploring Utilities Chapter 5 Exploring Utilities Chapter 5 Examining the contents of files. Working with the cut and paste feature. Formatting output with the column utility. Searching for lines containing a target string with grep.

More information

Table of contents. Our goal. Notes. Notes. Notes. Summer June 29, Our goal is to see how we can use Unix as a tool for developing programs

Table of contents. Our goal. Notes. Notes. Notes. Summer June 29, Our goal is to see how we can use Unix as a tool for developing programs Summer 2010 Department of Computer Science and Engineering York University Toronto June 29, 2010 1 / 36 Table of contents 1 2 3 4 2 / 36 Our goal Our goal is to see how we can use Unix as a tool for developing

More information

Unix Introduction to UNIX

Unix Introduction to UNIX Unix Introduction to UNIX Get Started Introduction The UNIX operating system Set of programs that act as a link between the computer and the user. Developed in 1969 by a group of AT&T employees Various

More information

Software Package Management Commands

Software Package Management Commands Software Package Management Commands This chapter describes the Cisco IOS XR commands used to add packages to a router storage device, activate or deactivate packages, upgrade or downgrade existing packages,

More information

Secure Shell Commands

Secure Shell Commands This module describes the Cisco IOS XR software commands used to configure Secure Shell (SSH). For detailed information about SSH concepts, configuration tasks, and examples, see the Implementing Secure

More information

Configuring Disk Backup and Disk Mirroring

Configuring Disk Backup and Disk Mirroring This module describes the process to configure disk mirroring and create a backup disk of the packages and configurations in Cisco IOS XR software. Note The disk backup feature is also known as Golden

More information

5/20/2007. Touring Essential Programs

5/20/2007. Touring Essential Programs Touring Essential Programs Employing fundamental utilities. Managing input and output. Using special characters in the command-line. Managing user environment. Surveying elements of a functioning system.

More information

Shell Programming Overview

Shell Programming Overview Overview Shell programming is a way of taking several command line instructions that you would use in a Unix command prompt and incorporating them into one program. There are many versions of Unix. Some

More information

2) clear :- It clears the terminal screen. Syntax :- clear

2) clear :- It clears the terminal screen. Syntax :- clear 1) cal :- Displays a calendar Syntax:- cal [options] [ month ] [year] cal displays a simple calendar. If arguments are not specified, the current month is displayed. In addition to cal, the ncal command

More information

UNIX files searching, and other interrogation techniques

UNIX files searching, and other interrogation techniques UNIX files searching, and other interrogation techniques Ways to examine the contents of files. How to find files when you don't know how their exact location. Ways of searching files for text patterns.

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~

~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ (( )) (( )) [ x x ] cdc communications, inc. [ x x ] \ / presents... \ / (` ') (` ') (U) (U) Gibe's UNIX COMMAND Bible ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The latest file from the Cow's

More information

Utilities. September 8, 2015

Utilities. September 8, 2015 Utilities September 8, 2015 Useful ideas Listing files and display text and binary files Copy, move, and remove files Search, sort, print, compare files Using pipes Compression and archiving Your fellow

More information

bash, part 3 Chris GauthierDickey

bash, part 3 Chris GauthierDickey bash, part 3 Chris GauthierDickey More redirection As you know, by default we have 3 standard streams: input, output, error How do we redirect more than one stream? This requires an introduction to file

More information

Configuration File Management Commands

Configuration File Management Commands This chapter provides detailed descriptions of commands used to manage configuration files in Cisco IOS Release 12.2. Configuration files contain the set of commands used to customize the function of the

More information

Using the Command-Line Interface

Using the Command-Line Interface CHAPTER 1 The command-line interface (CLI) is a line-oriented user interface that has a set of commands for configuring, managing, and monitoring the CSS. To help you use these commands, this chapter provides

More information

Available Commands CHAPTER

Available Commands CHAPTER CHAPTER 2 This chapter contains the Cisco IPS 6.2 commands listed in alphabetical order. It contains the following sections:. anomaly-detection load, page 2-4 anomaly-detection save, page 2-5 banner login,

More information

Configuration Management Commands on the Cisco IOS XR Software

Configuration Management Commands on the Cisco IOS XR Software Configuration Management Commands on the Cisco IOS XR Software This module describes the Cisco IOS XR commands used to manage your basic configuration. For detailed information about configuration management

More information

Cisco IOS Shell. Finding Feature Information. Prerequisites for Cisco IOS.sh. Last Updated: December 14, 2012

Cisco IOS Shell. Finding Feature Information. Prerequisites for Cisco IOS.sh. Last Updated: December 14, 2012 Cisco IOS Shell Last Updated: December 14, 2012 The Cisco IOS Shell (IOS.sh) feature provides shell scripting capability to the Cisco IOS command-lineinterface (CLI) environment. Cisco IOS.sh enhances

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server 4 CHAPTER Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Utilities. Introduction. Working with SCE Platform Files. Working with Directories CHAPTER

Utilities. Introduction. Working with SCE Platform Files. Working with Directories CHAPTER CHAPTER 4 Revised: September 27, 2012, Introduction This chapter describes the following utilities: Working with SCE Platform Files, page 4-1 The User Log, page 4-5 Managing Syslog, page 4-8 Flow Capture,

More information

Basics. I think that the later is better.

Basics.  I think that the later is better. Basics Before we take up shell scripting, let s review some of the basic features and syntax of the shell, specifically the major shells in the sh lineage. Command Editing If you like vi, put your shell

More information

Configuring TACACS+ About TACACS+

Configuring TACACS+ About TACACS+ This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on Cisco NX-OS devices. This chapter includes the following sections: About TACACS+,

More information

Linux & Shell Programming 2014

Linux & Shell Programming 2014 Practical No : 1 Enrollment No: Group : A Practical Problem Write a date command to display date in following format: (Consider current date as 4 th January 2014) 1. dd/mm/yy hh:mm:ss 2. Today's date is:

More information

h/w m/c Kernel shell Application s/w user

h/w m/c Kernel shell Application s/w user Structure of Unix h/w m/c Kernel shell Application s/w. user While working with unix, several layers of interaction occur b/w the computer h/w & the user. 1. Kernel : It is the first layer which runs on

More information

Unix L555. Dept. of Linguistics, Indiana University Fall Unix. Unix. Directories. Files. Useful Commands. Permissions. tar.

Unix L555. Dept. of Linguistics, Indiana University Fall Unix. Unix. Directories. Files. Useful Commands. Permissions. tar. L555 Dept. of Linguistics, Indiana University Fall 2010 1 / 21 What is? is an operating system, like DOS or Windows developed in 1969 by Bell Labs works well for single computers as well as for servers

More information

Configuration Management Commands

Configuration Management Commands Configuration Management Commands This module describes the Cisco IOS XR commands used to manage your basic configuration. For detailed information about configuration management concepts, tasks, and examples,

More information

Boot Commands on the Cisco IOS XR Software

Boot Commands on the Cisco IOS XR Software This module describes the commands used to boot or reset Cisco IOS XR software. For more information about ROM Monitor (ROMMON) and boot tasks, see Cisco IOS XR ROM Monitor Guide for the Cisco CRS Router

More information

LOG ON TO LINUX AND LOG OFF

LOG ON TO LINUX AND LOG OFF EXPNO:1A LOG ON TO LINUX AND LOG OFF AIM: To know how to logon to Linux and logoff. PROCEDURE: Logon: To logon to the Linux system, we have to enter the correct username and password details, when asked,

More information

A Brief Introduction to the Linux Shell for Data Science

A Brief Introduction to the Linux Shell for Data Science A Brief Introduction to the Linux Shell for Data Science Aris Anagnostopoulos 1 Introduction Here we will see a brief introduction of the Linux command line or shell as it is called. Linux is a Unix-like

More information

Module 8 Pipes, Redirection and REGEX

Module 8 Pipes, Redirection and REGEX Module 8 Pipes, Redirection and REGEX Exam Objective 3.2 Searching and Extracting Data from Files Objective Summary Piping and redirection Partial POSIX Command Line and Redirection Command Line Pipes

More information

Password Management Guidelines for Cisco UCS Passwords

Password Management Guidelines for Cisco UCS Passwords Guidelines for Cisco UCS Passwords, page 1 Guidelines for Cisco UCS Usernames, page 3 Configuring the Maximum Number of Password Changes for a Change Interval, page 4 Configuring a No Change Interval for

More information

Contents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version...

Contents. Note: pay attention to where you are. Note: Plaintext version. Note: pay attention to where you are... 1 Note: Plaintext version... Contents Note: pay attention to where you are........................................... 1 Note: Plaintext version................................................... 1 Hello World of the Bash shell 2 Accessing

More information

Traffic Mirroring Commands on the Cisco IOS XR Software

Traffic Mirroring Commands on the Cisco IOS XR Software Traffic Mirroring Commands on the Cisco IOS XR Software This module describes the commands used to configure and monitor traffic mirroring. acl, page 2 clear monitor-session counters, page 4 destination

More information

Router Recovery with ROM Monitor

Router Recovery with ROM Monitor This chapter describes the router recovery methods in ROM Monitor (ROMMON) mode of the router. Information About Router Recovery, page 1 About ROMMON Installation Files, page 2 About the TURBOBOOT Variable,

More information

Software Package Management Commands

Software Package Management Commands Software Package Management Commands This chapter describes the Cisco IOS XR commands used to add packages to a router storage device, activate or deactivate packages, upgrade or downgrade existing packages,

More information

Secure Shell Commands

Secure Shell Commands This module describes the Cisco IOS XR software commands used to configure Secure Shell (SSH). For detailed information about SSH concepts, configuration tasks, and examples, see the Implementing Secure

More information

QUESTION BANK ON UNIX & SHELL PROGRAMMING-502 (CORE PAPER-2)

QUESTION BANK ON UNIX & SHELL PROGRAMMING-502 (CORE PAPER-2) BANK ON & SHELL PROGRAMMING-502 (CORE PAPER-2) TOPIC 1: VI-EDITOR MARKS YEAR 1. Explain set command of vi editor 2 2011oct 2. Explain the modes of vi editor. 7 2013mar/ 2013 oct 3. Explain vi editor 5

More information

Disk Operating System

Disk Operating System Disk Operating System DOS stands for Disk Operating System. DOS controls the computer s hardware and provides an environment for programs to run. This system program must always be present when working

More information

Keychain Management Commands

Keychain Management Commands This module describes the commands used to configure keychain management. For detailed information about keychain management concepts, configuration tasks, and examples, see the Implementing Keychain Management

More information

Implementing Management Plane Protection on Cisco IOS XR Software

Implementing Management Plane Protection on Cisco IOS XR Software Implementing Management Plane Protection on Cisco IOS XR Software The Management Plane Protection (MPP) feature in Cisco IOS XR software provides the capability to restrict the interfaces on which network

More information

Implementing NTP. Release 3.8.0

Implementing NTP. Release 3.8.0 Network Time Protocol (NTP) is a protocol designed to time-synchronize devices within a network. Cisco IOS XR software implements NTPv4. NTPv4 retains backwards compatibility with the older versions of

More information

Command-Line Interface Command Summary

Command-Line Interface Command Summary CHAPTER 1 Command-Line Interface Command Summary This chapter provides a summary of the command-line interface (CLI) commands included in the Cisco Global Site Selector (GSS) software. The command summary

More information

Configuring User Accounts and RBAC

Configuring User Accounts and RBAC This chapter contains the following sections: Information About User Accounts and RBAC, page 1 Guidelines and Limitations for User Accounts, page 4 Configuring User Accounts, page 5 Configuring RBAC, page

More information

Null Interface Commands

Null Interface Commands This module provides command line interface (CLI) commands for configuring null interfaces on the Cisco CRS Router. interface null 0, page 2 show controllers null interface, page 3 show interfaces null0,

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 31 This chapter describes how to configure system message logging on the Catalyst 3560 switch. Note For complete syntax and usage information for the commands used in this chapter, see the Cisco

More information

GSS Administration and Troubleshooting

GSS Administration and Troubleshooting CHAPTER 9 GSS Administration and Troubleshooting This chapter covers the procedures necessary to properly manage and maintain your GSSM and GSS devices, including login security, software upgrades, GSSM

More information

Shells and Shell Programming

Shells and Shell Programming Shells and Shell Programming 1 Shells A shell is a command line interpreter that is the interface between the user and the OS. The shell: analyzes each command determines what actions are to be performed

More information

Lab 7 Configuring Basic Router Settings with IOS CLI

Lab 7 Configuring Basic Router Settings with IOS CLI Lab 7 Configuring Basic Router Settings with IOS CLI Objectives Part 1: Set Up the Topology and Initialize Devices Cable equipment to match the network topology. Initialize and restart the router and switch.

More information

Implementing Secure Shell

Implementing Secure Shell Implementing Secure Shell Secure Shell (SSH) is an application and a protocol that provides a secure replacement to the Berkeley r-tools. The protocol secures sessions using standard cryptographic mechanisms,

More information

PilotEdit User Manual. Author: Date: Version:

PilotEdit User Manual. Author: Date: Version: PilotEdit User Manual Author: support@pilotedit.com Date: 2018-02-28 Version: 11.3.0 URL: http://www.pilotedit.com Table of Contents 1. Introduction... 6 1.1. What is PilotEdit?... 6 1.2. PilotEdit GUI...

More information

Boot Commands on. System Management Command Reference for the Cisco NCS 6000 Series Routers OL

Boot Commands on. System Management Command Reference for the Cisco NCS 6000 Series Routers OL This module describes the commands used to boot or reset Cisco IOS XR software. For more information about ROM Monitor (ROMMON) and boot tasks, see or. reload, page 2 reload (administration EXEC), page

More information

Packet Tracer - Navigating the IOS

Packet Tracer - Navigating the IOS Topology Objectives Part 1: Establish Basic Connections, Access the CLI, and Explore Help Part 2: Explore EXEC Modes Part 3: Set the Clock Background In this activity, you will practice skills necessary

More information

Introduction to Linux Part 1. Anita Orendt and Wim Cardoen Center for High Performance Computing 24 May 2017

Introduction to Linux Part 1. Anita Orendt and Wim Cardoen Center for High Performance Computing 24 May 2017 Introduction to Linux Part 1 Anita Orendt and Wim Cardoen Center for High Performance Computing 24 May 2017 ssh Login or Interactive Node kingspeak.chpc.utah.edu Batch queue system kp001 kp002. kpxxx FastX

More information

Shells and Shell Programming

Shells and Shell Programming Shells and Shell Programming Shells A shell is a command line interpreter that is the interface between the user and the OS. The shell: analyzes each command determines what actions are to be performed

More information

Using UNIX. -rwxr--r-- 1 root sys Sep 5 14:15 good_program

Using UNIX. -rwxr--r-- 1 root sys Sep 5 14:15 good_program Using UNIX. UNIX is mainly a command line interface. This means that you write the commands you want executed. In the beginning that will seem inferior to windows point-and-click, but in the long run the

More information

MPLS Forwarding Commands on Cisco IOS XR Software

MPLS Forwarding Commands on Cisco IOS XR Software MPLS Forwarding Commands on Cisco IOS XR Software This chapter describes the commands that you will use to configure and use Multiprotocol Label Switching (MPLS) forwarding. For detailed information about

More information

The input can also be taken from a file and similarly the output can be redirected to another file.

The input can also be taken from a file and similarly the output can be redirected to another file. Filter A filter is defined as a special program, which takes input from standard input device and sends output to standard output device. The input can also be taken from a file and similarly the output

More information

Initial Configuration

Initial Configuration 3 CHAPTER This chapter describes the initial configuration of the ML-Series card and contains the following major sections: Hardware Installation, page 3-1 Cisco IOS on the ML-Series Card, page 3-2 Startup

More information

CSE 390a Lecture 2. Exploring Shell Commands, Streams, and Redirection

CSE 390a Lecture 2. Exploring Shell Commands, Streams, and Redirection 1 CSE 390a Lecture 2 Exploring Shell Commands, Streams, and Redirection slides created by Marty Stepp, modified by Jessica Miller & Ruth Anderson http://www.cs.washington.edu/390a/ 2 Lecture summary Unix

More information

Software Package Management Commands on the Cisco ASR 9000 Series Router

Software Package Management Commands on the Cisco ASR 9000 Series Router Software Package Management Commands on the Cisco ASR 9000 Series Router This chapter describes the Cisco IOS XR commands used to add packages to a router storage device, activate or deactivate packages,

More information

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines

Introduction to UNIX. Logging in. Basic System Architecture 10/7/10. most systems have graphical login on Linux machines Introduction to UNIX Logging in Basic system architecture Getting help Intro to shell (tcsh) Basic UNIX File Maintenance Intro to emacs I/O Redirection Shell scripts Logging in most systems have graphical

More information

Week Overview. Unix file system File types and file naming Basic file system commands: pwd,cd,ls,mkdir,rmdir,mv,cp,rm man pages

Week Overview. Unix file system File types and file naming Basic file system commands: pwd,cd,ls,mkdir,rmdir,mv,cp,rm man pages ULI101 Week 02 Week Overview Unix file system File types and file naming Basic file system commands: pwd,cd,ls,mkdir,rmdir,mv,cp,rm man pages Text editing Common file utilities: cat,more,less,touch,file,find

More information

Section 2.2 Your First Program in Java: Printing a Line of Text

Section 2.2 Your First Program in Java: Printing a Line of Text Chapter 2 Introduction to Java Applications Section 2.2 Your First Program in Java: Printing a Line of Text 2.2 Q1: End-of-line comments that should be ignored by the compiler are denoted using a. Two

More information

Command-Line Interface Command Summary

Command-Line Interface Command Summary CHAPTER 1 Command-Line Interface Command Summary This chapter provides a summary of the command-line interface (CLI) commands included in the Global Site Selector software. The command summary tables are

More information

Software Package Management Commands on the Cisco ASR 9000 Series Router

Software Package Management Commands on the Cisco ASR 9000 Series Router Software Package Management Commands on the Cisco ASR 9000 Series Router This chapter describes the Cisco IOS XR commands used to add packages to a router storage device, activate or deactivate packages,

More information

Role-Based Access Configuration

Role-Based Access Configuration Role-Based Access Control Overview, page 1 User Accounts for Cisco UCS, page 1 User Roles, page 3 Locales, page 9 Locally Authenticated User Accounts, page 11 Monitoring User Sessions, page 19 Role-Based

More information

Configuring User Accounts and RBAC

Configuring User Accounts and RBAC Configuring User Accounts and RBAC This chapter contains the following sections: Configuring User Accounts and RBAC, page 1 Configuring User Accounts and RBAC This section describes how to configure user

More information

Sensitive Data Detection

Sensitive Data Detection The following topics explain sensitive data detection and how to configure it: Basics, page 1 Global Options, page 2 Individual Sensitive Data Type Options, page 3 System-Provided Sensitive Data Types,

More information

Configurations for the Layer 3 Switch Router

Configurations for the Layer 3 Switch Router CHAPTER 3 This chapter describes the initial configuration of the Layer 3 switch router and contains the following major sections: Starting Up the Layer 3 Switch Router, page 3-1 Using the Console and

More information

A through Z Commands

A through Z Commands A through Z Commands Americas Headquarters: Cisco Systems, Inc., 170 West Tasman Drive, San Jose, CA 95134-1706 USA shell environment load A through Z Commands shell environment load To download Cisco

More information

This is Lab Worksheet 3 - not an Assignment

This is Lab Worksheet 3 - not an Assignment This is Lab Worksheet 3 - not an Assignment This Lab Worksheet contains some practical examples that will prepare you to complete your Assignments. You do not have to hand in this Lab Worksheet. Make sure

More information

Fall Lecture 5. Operating Systems: Configuration & Use CIS345. The Linux Utilities. Mostafa Z. Ali.

Fall Lecture 5. Operating Systems: Configuration & Use CIS345. The Linux Utilities. Mostafa Z. Ali. Fall 2009 Lecture 5 Operating Systems: Configuration & Use CIS345 The Linux Utilities Mostafa Z. Ali mzali@just.edu.jo 1 1 The Linux Utilities Linux did not have a GUI. It ran on character based terminals

More information

Chapter 4. Unix Tutorial. Unix Shell

Chapter 4. Unix Tutorial. Unix Shell Chapter 4 Unix Tutorial Users and applications interact with hardware through an operating system (OS). Unix is a very basic operating system in that it has just the essentials. Many operating systems,

More information

Operating Systems, Unix Files and Commands SEEM

Operating Systems, Unix Files and Commands SEEM Operating Systems, Unix Files and Commands SEEM 3460 1 Major Components of Operating Systems (OS) Process management Resource management CPU Memory Device File system Bootstrapping SEEM 3460 2 Programs

More information

User and System Administration

User and System Administration CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays

More information

Unix File System. Learning command-line navigation of the file system is essential for efficient system usage

Unix File System. Learning command-line navigation of the file system is essential for efficient system usage ULI101 Week 02 Week Overview Unix file system File types and file naming Basic file system commands: pwd,cd,ls,mkdir,rmdir,mv,cp,rm man pages Text editing Common file utilities: cat,more,less,touch,file,find

More information

Configuring User Accounts and RBAC

Configuring User Accounts and RBAC 6 CHAPTER This chapter describes how to configure user accounts and role-based access control (RBAC) on NX-OS devices. This chapter includes the following sections: Information About User Accounts and

More information

PracticeMaster Report Writer Guide

PracticeMaster Report Writer Guide Copyright 2014-2015 Software Technology, Inc. 1621 Cushman Drive Lincoln, NE 68512 (402) 423-1440 Tabs3.com Tabs3, PracticeMaster, and the "pinwheel" symbol ( ) are registered trademarks of Software Technology,

More information

Viewing Log Files. Understanding GSS Logging Levels CHAPTER

Viewing Log Files. Understanding GSS Logging Levels CHAPTER CHAPTER 8 This chapter describes how to store and view logged information about your GSS devices. Each GSS device contains a number of log files that retain records of specified GSS-related activities

More information

CSCI 2132 Software Development. Lecture 4: Files and Directories

CSCI 2132 Software Development. Lecture 4: Files and Directories CSCI 2132 Software Development Lecture 4: Files and Directories Instructor: Vlado Keselj Faculty of Computer Science Dalhousie University 12-Sep-2018 (4) CSCI 2132 1 Previous Lecture Some hardware concepts

More information

Using the Migration Utility to Migrate Data from ACS 4.x to ACS 5.5

Using the Migration Utility to Migrate Data from ACS 4.x to ACS 5.5 6 CHAPTER Using the Migration Utility to Migrate Data from ACS 4.x to ACS 5.5 This chapter describes how to migrate data from ACS 4.x to ACS 5.5 and contains: Introduction, page 6-1 Running the Migration

More information

Basic Device Management

Basic Device Management This chapter contains the following sections: About, page 1 Licensing Requirements for, page 2 Default Settings for Basic Device Parameters, page 3 Changing the Device Hostname, page 3 Configuring the

More information

File System Commands

File System Commands This chapter describes the Cisco IOS XR software commands used to manage file systems on your router. Note The commands in this module should not be used to access or modify any Cisco IOS XR software or

More information

Initial Configuration on ML-Series Card

Initial Configuration on ML-Series Card CHAPTER 3 This chapter describes the initial configuration of the ML-Series card and contains the following major sections: Hardware Installation, page 3-1 Cisco IOS on the ML-Series Card, page 3-2 Startup

More information

Scripting Languages Course 1. Diana Trandabăț

Scripting Languages Course 1. Diana Trandabăț Scripting Languages Course 1 Diana Trandabăț Master in Computational Linguistics - 1 st year 2017-2018 Today s lecture Introduction to scripting languages What is a script? What is a scripting language

More information

ACS Unix (Winter Term, ) Page 51

ACS Unix (Winter Term, ) Page 51 ACS-294-001 Unix (Winter Term, 2016-2017) Page 51 Unix sets up the output file before starting the cat program. Thus, the file name will be cleared out before cat reads and combines its input. By the time

More information

22-Sep CSCI 2132 Software Development Lecture 8: Shells, Processes, and Job Control. Faculty of Computer Science, Dalhousie University

22-Sep CSCI 2132 Software Development Lecture 8: Shells, Processes, and Job Control. Faculty of Computer Science, Dalhousie University Lecture 8 p.1 Faculty of Computer Science, Dalhousie University CSCI 2132 Software Development Lecture 8: Shells, Processes, and Job Control 22-Sep-2017 Location: Goldberg CS 127 Time: 14:35 15:25 Instructor:

More information

Review of Fundamentals

Review of Fundamentals Review of Fundamentals 1 The shell vi General shell review 2 http://teaching.idallen.com/cst8207/14f/notes/120_shell_basics.html The shell is a program that is executed for us automatically when we log

More information

Configuring System Message Logging

Configuring System Message Logging CHAPTER 1 This chapter describes how to configure system message logging on the Cisco 4700 Series Application Control Engine (ACE) appliance. Each ACE contains a number of log files that retain records

More information

ECE Lesson Plan - Class 1 Fall, 2001

ECE Lesson Plan - Class 1 Fall, 2001 ECE 201 - Lesson Plan - Class 1 Fall, 2001 Software Development Philosophy Matrix-based numeric computation - MATrix LABoratory High-level programming language - Programming data type specification not

More information

CSE 390a Lecture 2. Exploring Shell Commands, Streams, Redirection, and Processes

CSE 390a Lecture 2. Exploring Shell Commands, Streams, Redirection, and Processes CSE 390a Lecture 2 Exploring Shell Commands, Streams, Redirection, and Processes slides created by Marty Stepp, modified by Jessica Miller & Ruth Anderson http://www.cs.washington.edu/390a/ 1 2 Lecture

More information

EnableBasic. The Enable Basic language. Modified by Admin on Sep 13, Parent page: Scripting Languages

EnableBasic. The Enable Basic language. Modified by Admin on Sep 13, Parent page: Scripting Languages EnableBasic Old Content - visit altium.com/documentation Modified by Admin on Sep 13, 2017 Parent page: Scripting Languages This Enable Basic Reference provides an overview of the structure of scripts

More information

HANDLING ORDINARY FILES

HANDLING ORDINARY FILES HANDLING ORDINARY FILES FILE RELATED COMMANDS cat: DISPLAYING AND CREATING FILES Cat command is used to display the contents of a small file on the terminal. $ cat cprogram.c # include void main

More information